Tamper-Proof AI
Signature Verification
Kumpirma integrates Pix2Pix GAN denoising and a Siamese Capsule Network into a forensic-grade pipeline — anchoring every verification outcome immutably on Ethereum.
System Architecture
Two-Signature Verification Model
The system separates the roles of reference registration and verification submission — ensuring ground-truth authenticity at every stage.
Signature 1 — Reference
Admin / Verifier
Registered by the Admin. Stored on IPFS and anchored on-chain as the verified baseline for a given signatory.
Signature 2 — Questioned
End-User / Client
Submitted by the user on a scanned document. Compared against Signature 1 through the full AI pipeline.
Core Technologies
A forensic-grade hybrid architecture providing cryptographic certainty in distinguishing authentic signatures from sophisticated forgeries.
A conditional U-Net GAN auto-isolates the signature region from scanned documents, removing background noise, stamps, and scanner artifacts for pristine feature extraction.
Multi-channel Siamese Capsule Networks preserve the explicit spatial hierarchy and pen-stroke geometry that standard CNNs lose — detecting even highly skilled forgeries.
An oracle layer cross-validates AI model output before on-chain submission, acting as a middleware gate to ensure only verified results are recorded immutably.
Verification hashes and IPFS content identifiers are permanently anchored on-chain via an EVM-compatible smart contract, establishing an irrefutable cryptographic audit trail.
System Capabilities
Institutional-grade capabilities designed for secure, auditable, and accurate forensic document authentication.
Processes physical handwritten signatures from scanned documents using OpenCV — no live signing pad required for verification.
Reference signatures and verification records are hashed into content-addressable IPFS identifiers (CIDs), preventing any silent data manipulation.
Admin/Verifier manages the reference signature database and views system-wide metrics. End-users submit questioned documents and see only their own results.
OpenCV-powered computer vision autonomously detects and crops the signature region from full-page document scans before any AI inference runs.
Each verification returns a percentage confidence score from the CapsNet model, providing quantifiable certainty for Admin review and audit documentation.
Every confirmed verification generates a blockchain receipt — transaction hash, IPFS CID, block number, and timestamp — visible in the dashboard and cryptographically verifiable.
Verification Pipeline
A six-stage deterministic pipeline that transforms a physical document scan into an immutable blockchain-anchored verification record.
1. Document Upload
The end-user uploads a scanned document containing the questioned handwritten signature. The system securely receives the file for preprocessing.
2. OpenCV Signature Cropping
Advanced computer vision autonomously detects and isolates the signature region from the full-page scan with bounding-box precision, discarding irrelevant document areas.
3. Pix2Pix GAN Denoising
The cropped signature is passed through a U-Net conditional GAN, which removes background noise, stamps, and scanner artifacts — producing a clean signature for accurate AI inference.
4. Siamese CapsNet Verification
The denoised signature is evaluated by the Siamese Capsule Network against the registered Reference Signature (Sig 1). The model outputs a genuine/forged verdict with a confidence percentage.
5. Intelligent Oracle Validation
An oracle middleware layer cross-validates the AI result for integrity before any on-chain transaction is initiated, acting as a final verification gate.
6. Blockchain Archiving
Upon Oracle confirmation, the verification hash and IPFS content identifier (CID) are transacted to an Ethereum-compatible Smart Contract — establishing an irrefutable, tamper-proof audit trail.
Frequently Asked Questions
Ready to Verify a Document?
Access the Kumpirma dashboard to submit questioned signatures, manage reference identities, and view immutable blockchain receipts.
Role-based access — Admin/Verifier and End-User accounts supported.